A multi-threaded, Python-based network security tool designed for stealthy SYN scanning and automated vulnerability analysis. It combines low-level packet crafting with an easy-to-use graphical interface.
SYN_Scanner_GUI_Tool_V_7.0 is a comprehensive network reconnaissance and security auditing tool developed in Python. Designed for penetration testers and ethical hackers, this tool bridges the gap between low-level packet crafting and high-level vulnerability analysis.
Unlike standard socket scanners that fully complete the TCP handshake—making them "noisy" and easily detectable by Intrusion Detection Systems (IDS)—Netmap leverages scapy to perform raw SYN Stealth Scans. By utilizing "half-open" scanning techniques (SYN -> SYN-ACK -> RST), it maps network ports without establishing a full connection, significantly reducing the logging footprint on target systems.
Beyond simple port discovery, Netmap integrates an automated vulnerability assessment engine. It actively fingerprints running services (Banner Grabbing) and queries the NIST National Vulnerability Database (NVD) API in real-time. This allows the tool to instantly identify potential CVEs (Common Vulnerabilities and Exposures) associated with the detected software versions, providing immediate actionable intelligence.
Packed with a responsive multi-threaded GUI, Netmap offers a streamlined workflow for vertical target analysis, horizontal subnet sweeping, and randomized evasion scanning.
-
Kali Linux Integration: Built to function as a native system tool, fully compatible with the Kali Linux application menu and standard tool list organization.
-
Stealth SYN Scanning: Perform half-open scans to map network ports without completing the TCP handshake. Uses
scapyto perform half-open TCP scans (SYN-ACK / RST), which are often quieter than full-connect scans. -
4 Scanning Modes: Vertical, Horizontal, Random, and Custom Range scanning.
-
Root Privileges Manager: Automatically handles sudo permissions required for raw socket operations.
-
Vulnerability Analysis (CVEs): Automatically grabs service banners and queries the NIST NVD Database to identify known Common Vulnerabilities and Exposures (CVEs).
-
4 Scanning Modes:
- Vertical: Scan all ports on a single target.
- Horizontal: Scan a specific port across an entire LAN subnet.
- Random: Randomized port scanning for evasion.
- Custom: User-defined port ranges.
-
Report Generation: Save scan results, including discovered banners and CVEs, to a text file.
-
Root Check: Automatically detects if the user has the necessary permissions for raw socket operations.
- OS: Kali Linux (or any Linux with root access).
- Python: Python 3.x
- Permissions: Root/Sudo access is required to craft SYN packets.
git clone [https://github.com/sreekanthankn/Netmap-Stealth-Scanner.git](https://github.com/sreekanthankn/Netmap-Stealth-Scanner.git)
cd Netmap-Stealth-Scannersudo pip3 install -r requirements.txtThis script creates a desktop shortcut and adds the tool to your Kali Application Menu.
chmod +x manage_scanner.sh
sudo ./manage_scanner.shRunning via Terminal
sudo python3 SYN_Scanner_GUI_Tool_V_7.0.py-
User Name: Enter your name (for the report).
-
Target IP: Enter the target IP (e.g., 192.168.1.5) or Domain.
-
Ports: Define the range (e.g., 0 to 1023).
-
Mode: Select your scan type (Vertical, Horizontal, etc.).
-
Click START SCAN: The tool will map open ports.
Wait for Analysis: After scanning, the tool enters "Phase 2" to fetch banners and check for CVEs.
See ACKNOWLEDGEMENTS.md for credits and thanks.
For support, feedback, or collaboration:
- Sreekanthan K N
- Email: [email protected]
- LinkedIn: https://www.linkedin.com/in/sreekanthan-k-n-79763623
- GitHub: https://github.com/sreekanthankn
Feel free to open an issue for bugs, improvements, or feature requests.
This tool is for educational and authorized testing purposes only. Scanning targets without prior mutual consent is illegal. The developer is not responsible for any misuse or damage caused by this program. Always obtain permission before scanning networks you do not own.
Standard MIT License.
MIT License
Copyright (c) 2026 Sreekanth K N
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.